US20200120090A1 - Biometric data synchronization devices - Google Patents

Biometric data synchronization devices Download PDF

Info

Publication number
US20200120090A1
US20200120090A1 US16/479,290 US201716479290A US2020120090A1 US 20200120090 A1 US20200120090 A1 US 20200120090A1 US 201716479290 A US201716479290 A US 201716479290A US 2020120090 A1 US2020120090 A1 US 2020120090A1
Authority
US
United States
Prior art keywords
computing device
biometric data
biometric
access
computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/479,290
Other versions
US11178142B2 (en
Inventor
Ching-Hua Li
Yi-Kang Hsieh
Chung-Chun Chen
Ming-Shien TSAI
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHEN, CHUNG-CHUN, HSIEH, YI-KANG, LI, CHING-HUA, TSAI, MING-SHIEN
Publication of US20200120090A1 publication Critical patent/US20200120090A1/en
Application granted granted Critical
Publication of US11178142B2 publication Critical patent/US11178142B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Definitions

  • Various types of computing devices exist that implement various types of security in order to prevent unauthorized access to data stored thereon or functionality provided by the computing device.
  • Passwords may be used to gain access to the computing device with the owner or those authorized to access the computing device having knowledge of the password information.
  • FIG. 1 is a diagram of a computing system according to an example of the principles described herein.
  • FIG. 2 is a block diagram of a computing device according to an example of the principles described herein.
  • FIG. 3 is a flowchart showing a method of synchronizing biometric data according to an example of the principles described herein.
  • FIG. 4 is a flowchart showing a method of synchronizing biometric data according to an example of the principles described herein.
  • passwords may be used to gain access to a computing device by those presented with the password and actually authorized to gain access to the computing device.
  • passwords have proven difficult in their use due to, in part, an authorized person forgetting the password.
  • the importance of maintaining data security with regards to sensitive data has not decreased. Indeed, with the proliferation of this sensitive data on computing devices, the importance of protecting this data has increased.
  • biometric data sensors that detect the biometric data of a user and deny or provide access to the computing device based on the sensed biometric data.
  • biometric data sensors include fingerprint sensors, face recognition cameras, retinal scanners, among others.
  • the present specification describes a computing system that includes a first computing device comprising at least one biometric data sensor and a biometric synchronization module on the first computing device to, when executed by a processor, synchronize biometric data from the first computing device to a second computing device in response to a biometric registration request.
  • the present specification further describes a computing device that includes at least one biometric sensor and a token generation module to generate, at least, access tokens to be sent to a receiving computing device after a determination that biometric data has been synchronized between the computing device and the receiving computing device.
  • the present specification further describes a method of synchronizing biometric data that includes at a first computing device, receiving a request to unlock a second computing device using biometric data and at the first computing device, sending a biometric synchronization request to the second computing device to synchronize biometric data from the first computing device to the second computing device.
  • biometric data or “biometric patterns” are meant to be understood as patterns and data describing the physical characteristics of a user of a computing device.
  • the biometric data or biometric patterns are obtained when a user interfaces with a biometric data sensor.
  • a number of or similar language is meant to be understood broadly as any positive number comprising 1 to infinity; zero not being a number, but the absence of a number.
  • FIG. 1 is a diagram of a computing system according to an example of the principles described herein.
  • the computing system ( 100 ) may include a first computing device ( 105 ) and a second computing device ( 120 ); the second computing device ( 120 ) being selectively communicatively coupled to the first computing device ( 105 ).
  • the first computing device ( 105 ) and second computing device ( 120 ) may be communicatively coupled to each other via a cable, wireless such as via a Wi-Fi connection or a Bluetooth connection, near-field communication, among others.
  • the first computing device ( 105 ) and second computing device ( 120 ) may be an electronic device that includes, at least, a processor. Examples of electronic devices include servers, desktop computers, laptop computers, personal digital assistants (PDAs), mobile devices, smartphones, gaming systems, and tablets, among other electronic devices.
  • PDAs personal digital assistants
  • the first computing device ( 105 ) may include any number of biometric data sensors ( 110 ).
  • the biometric data sensors ( 110 ) may be capable of detecting a user's physical characteristics and comparing those characteristics to a database of characteristics. Once detected and/or stored, the user's characteristics may be referred to as biometric data. When the user's scanned characteristics match those characteristics maintained in the database, access and/or control of the first computing device ( 105 ) is granted. When the user's scanned characteristics do not match any characteristics maintained in the database, access and/or control of the first computing device ( 105 ) is not granted.
  • biometric data sensor ( 110 ) may be any sensor that can detect these user characteristics and compare those characteristics to a database of characteristics.
  • the biometric data sensor ( 110 ) may be a fingerprint scanner, a palm scanner, a retinal scanner, a facial recognition device, a hand scanner, an iris scanner, a voice analyzer, a DNA sequencer, a camera or any other device that can detect the user characteristics described herein.
  • the biometric data sensor ( 110 ) will be referred to as a fingerprint scanner when specific examples are presented.
  • the use of this example is not meant to be understood a limiting the present description and, instead, the present description contemplates any type of biometric data sensor ( 110 ) to detect any type of user characteristic described herein and store the biometric data describing those user characteristics.
  • the first computing device ( 105 ) and second computing device ( 120 ) may each include various hardware components.
  • these hardware components may be a number of processors, a number of data storage devices, a number of peripheral device adapters, and a number of network adapters. These hardware components may be interconnected through the use of a number of busses and/or network connections.
  • the processor, data storage device, peripheral device adapters, and network adapter may be communicatively coupled via a bus.
  • the processor may include the hardware architecture to retrieve executable code from the data storage device and execute the executable code.
  • the executable code may, when executed by the processor, cause the processor to implement at least the functionality of, at the first computing device ( 105 ), receive a request to unlock the second computing device ( 120 ) using biometric data and, at the first computing device ( 105 ), send a biometric synchronization request to the second computing device ( 120 ) to synchronize biometric data from the first computing device ( 105 ) to the second computing device ( 120 ), according to the methods of the present specification described herein.
  • the processor may receive input from and provide output to a number of the remaining hardware units.
  • the data storage device may store data such as executable program code that is executed by the processor or other processing device as well as user-specific biometric data describing the characteristics of the user as described herein. Further, the data storage device may specifically store computer code representing a number of applications that the processor executes to implement at least the functionality described herein.
  • the data storage device ( 102 ) may include various types of memory modules, including volatile and nonvolatile memory.
  • the data storage device ( 102 ) of the examples described herein includes Random Access Memory (RAM), Read Only Memory (ROM), and Hard Disk Drive (HDD) memory.
  • RAM Random Access Memory
  • ROM Read Only Memory
  • HDD Hard Disk Drive
  • Many other types of memory may also be utilized, and the present specification contemplates the use of many varying type(s) of memory in the data storage device as may suit a particular application of the principles described herein.
  • the processor may boot from Read Only Memory (ROM), maintain nonvolatile storage in the Hard Disk Drive (HDD) memory, and execute program code stored in Random Access Memory (RAM).
  • the data storage device ( 102 ) may comprise a computer readable medium, a computer readable storage medium, or a non-transitory computer readable medium, among others.
  • a computer readable storage medium may be any tangible medium that can contain, or store computer usable program code for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer readable storage medium may be any non-transitory medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • the hardware adapters in the first computing device ( 105 ) and second computing device ( 120 ) enable the processor to interface with various other hardware elements, external and internal to each of the first computing device ( 105 ) and second computing device ( 120 ).
  • the peripheral device adapters may provide an interface to input/output devices, such as, for example, display device, a mouse, or a keyboard.
  • the peripheral device adapters may also provide access to other external devices such as an external storage device, a number of network devices such as, for example, servers, switches, and routers, client devices, other types of computing devices, and combinations thereof.
  • At least the first computing device ( 105 ) may further include a number of modules used in the implementation of the methods described herein.
  • the various modules within the first computing device ( 105 ) may include executable program code that may be executed separately.
  • the various modules may be stored as separate computer program products.
  • the various modules within the first computing device ( 105 ) may be combined within a number of computer program products; each computer program product comprising a number of the modules.
  • the first computing device ( 105 ) may include a biometric synchronization module ( 115 ) to, when executed by the processor, synchronize biometric data between the first computing device ( 105 ) that includes at least one biometric data sensor ( 110 ) with the second computing device ( 120 ) that does not include any biometric data sensor ( 110 ).
  • the biometric synchronization module ( 115 ) module ( 110 ) may receive a request to synchronize the biometric data with the second computing device ( 120 ) in order to allow a user to access the functions of the second computing device ( 120 ).
  • the first computing device ( 105 ) may further include a token generation module to generate, at least, access tokens to be sent to the second computing device ( 120 ) after a determination that biometric data has been synchronized between the first computing device ( 105 ) and the second computing device ( 120 ).
  • a token generation module to generate, at least, access tokens to be sent to the second computing device ( 120 ) after a determination that biometric data has been synchronized between the first computing device ( 105 ) and the second computing device ( 120 ).
  • the first computing device ( 105 ) may determine whether a biometric database of the first computing device ( 105 ) and the second computing device ( 120 ) is shared. If not, the first computing device ( 105 ) may send a request to the second computing device ( 120 ) inquiring whether the second computing device ( 120 ) has a biometric database analyzer consistent with the biometric data sensor ( 110 ) of the first computing device ( 105 ). As an example, the first computing device ( 105 ), having a fingerprint sensor, may send a request to the second computing device ( 120 ) inquiring whether the second computing device ( 120 ) has a fingerprint database analyzer that can analyze fingerprint data. Upon a determination that the second computing device ( 120 ) does not comprise a fingerprint data analyzer, the process stops and notice is given to the user that the second computing device ( 120 ) cannot analyze the fingerprint data.
  • the first computing device ( 105 ) and the second computing device ( 120 ) share the same biometric data in their respective biometric databases
  • a successful scan of a user's biometric data using the biometric data sensor ( 110 ) of the first computing device ( 105 ) will cause an unlock token to be sent to the second computing device ( 120 ).
  • the second computing device ( 120 ) may be unlocked thereby providing access to the second computing device ( 120 ) to the user.
  • a computing device not having a biometric data sensor ( 110 ) such as the second computing device ( 120 ) may be unlocked using the hardware devices such as the biometric data sensors ( 110 ) of the first computing device ( 105 ).
  • the second computing device ( 120 ) may maintain the biometric data received from the first computing device ( 105 ) in a biometric database on the second computing device ( 120 ).
  • Other user's biometric data may also be maintained in the biometric database of the second computing device ( 120 ) so as to allow multiple first computing devices ( 105 ) to provide access to the second computing device ( 120 ).
  • the process used to access both the first computing device ( 105 ) and second computing device ( 120 ) may be relatively more secure because a password is not used to complete the unlocking process of either the first computing device ( 105 ) and second computing device ( 120 ).
  • FIG. 2 is a block diagram of a computing device ( 205 ) according to an example of the principles described herein.
  • the computing device ( 205 ) may include a biometric sensor ( 210 ) similar to the biometric data sensor ( FIG. 1, 110 ) described above in connection with FIG. 1 .
  • the biometric sensor ( 210 ) may detect the user characteristics and maintain biometric data in a biometric database as described herein.
  • the computing device ( 205 ) may further include a token generation module ( 215 ).
  • the token generation module ( 215 ) may generate an unlock token after receipt of an indication at the computing device ( 205 ) that biometric data has been authorized at the biometric sensor ( 210 ).
  • the token may include computer readable instructions indicating to a receiving computing device that the user is authorized to access the receiving computing device and provide such access.
  • the token provided by the token generation module ( 215 ) may be encrypted providing additional security in the transaction between the computing device and receiving computing device.
  • FIG. 3 is a flowchart showing a method ( 300 ) of synchronizing biometric data according to an example of the principles described herein.
  • the method ( 300 ) may begin with, at a first computing device, receiving ( 305 ) a request to unlock a second computing device using biometric data.
  • the request may be initiated by a user of the first computing device ( FIG. 1, 105 ) when attempting to access a second computing device ( FIG. 1, 120 ).
  • the first computing device ( FIG. 1, 105 ) may send ( 310 ) a biometric synchronization request to the second computing device ( FIG. 1, 120 ) to synchronize biometric data from the first computing device ( FIG. 1, 105 ) to the second computing device ( FIG. 1, 120 ).
  • the synchronization of the biometric data between the first and second computing devices ( FIG. 1, 105, 120 ) may either cause the first computing device ( FIG. 1, 105 ) to send biometric data to the second computing device ( FIG. 1, 120 ) or begin an authentication process using the biometric data sensor ( FIG. 1, 110 ) so as to initiate the sending of an access token to the second computing device ( FIG. 1, 120 ).
  • FIG. 4 is a flowchart showing a method ( 400 ) of synchronizing biometric data according to an example of the principles described herein.
  • the method ( 400 ) may begin with the first computing device ( FIG. 1, 105 ) being placed ( 405 ) in a standby mode.
  • This standby mode may include any mode that places the first computing device ( FIG. 1, 105 ) in a state of accepting input from a user after any number of input actions.
  • the method ( 400 ) may continue with a signal being sent ( 410 ) to unlock the second computing device ( FIG. 1, 120 ).
  • the signal may be sent ( 410 ) to the second computing device ( FIG. 1, 120 ) after input from a user on the first computing device ( FIG. 1, 105 ) initiates an unlock process for the second computing device ( FIG. 1, 120 ).
  • Certain graphical user interfaces may be presented to the user on the first computing device ( FIG. 1, 105 ) in order to cause the signal to be sent ( 410 ) to the second computing device ( FIG. 1, 120 ).
  • the method ( 400 ) then continues by determining ( 415 ) if the first computing device ( FIG. 1, 105 ) and second computing device ( FIG. 1, 120 ) share the same biometric database.
  • the biometric database of the first computing device ( FIG. 1, 105 ) may include any biometric data received from the biometric data sensors ( FIG. 1, 110 ) of the first computing device ( FIG. 1, 105 ).
  • the second computing device ( FIG. 1, 120 ) may not include the same biometric data or even have access to the same biometric database as that found in the first computing device ( FIG. 1, 105 ).
  • a determination ( 420 ) may be made as to whether the second computing device ( FIG.
  • the process may return to placing the first computing device ( FIG. 1, 105 ) in a standby node and/or notifying a user, via the graphical user interface of the first computing device ( FIG. 1, 105 ), that the second computing device ( FIG. 1, 120 ) cannot be unlocked due to the lack of authentication.
  • the second computing device ( FIG. 1, 120 ) may be provided with access to a biometric database and a biometric data analyzer may be installed on the second computing device ( FIG. 1, 120 ) in order to allow access to the second computing device ( FIG. 1, 120 ) in a later process.
  • the second computing device When it has been determined (Decision YES, 420 ) that the second computing device ( FIG. 1, 120 ) maintains a biometric database and can analyze that biometric data sent to it from the first computing device ( FIG. 1, 105 ), it is then determined ( 425 ) if a biometric scan using the biometric data sensors ( FIG. 1, 110 ) on the first computing device ( FIG. 1, 105 ) are successful. If not (Determination No, 425 ), the process continues with the first computing device ( FIG. 1, 105 ) notifying the user of an unsuccessful biometric scan and places ( 405 ) the first computing device ( FIG. 1, 105 ) in a standby mode.
  • the second computing device ( FIG. 1, 120 ) determines ( 435 ) whether the biometric patterns are authentic. If it is determined (Determination No, 435 ) that the biometric patterns received by the first computing device ( FIG. 1, 105 ) are not authentic, the second computing device ( FIG. 1, 120 ) is maintained in a standby mode and access to the second computing device ( FIG. 1, 120 ) is not granted. However, if it is determined (Determination No, 435 ) that the biometric patterns received by the first computing device ( FIG. 1, 105 ) are authentic, the second computing device ( FIG. 1, 120 ) is unlocked ( 460 ).
  • the first computing device ( FIG. 1, 105 ) may receive ( 440 ) biometric authentication from the biometric data sensors ( FIG. 1, 110 ) on the first computing device ( FIG. 1, 105 ), make a determination (Determination YES. 445 ) that the biometric scan was successful and authenticated (Determination YES, 450 ) and then send ( 455 ) an unlock token to the second computing device ( FIG. 1, 120 ) instructing the second computing device ( FIG. 1, 120 ) to be unlocked ( 460 ).
  • a user may unlock the second computing device ( FIG. 1, 120 ) using the biometric data sensors ( FIG. 1, 110 ) of the first computing device ( FIG. 1, 105 ) even where the second computing device ( FIG. 1, 120 ) does not include biometric data sensors ( FIG. 1, 110 ) of its own.
  • the first computing device ( FIG. 1, 105 ) may implement this method ( 400 ) in order to unlock the second computing device ( FIG. 1, 120 ).
  • the second computing device ( FIG. 1, 120 ) may be used to unlock the first computing device ( FIG. 1, 105 ) per the method ( 400 ) described herein.
  • FIG. 1, 105 The computer usable program code may be provided to a processor of a general purpose computer, special purpose computer, the first computing device ( FIG. 1, 105 ), second computing device ( FIG. 1, 120 ), or other programmable data processing apparatus to produce a machine, such that the computer usable program code, when executed via, for example, the processor of either the first computing device ( FIG. 1, 105 ), second computing device ( FIG.
  • the computer usable program code may be embodied within a computer readable storage medium; the computer readable storage medium being part of the computer program product.
  • the computer readable storage medium is a non-transitory computer readable medium.
  • the system and methods describe the unlocking of the second computing device ( FIG. 1, 120 ) using the biometric data sensors ( FIG. 1, 110 ) of the first computing device ( FIG. 1, 105 ), other functions of the second computing device ( FIG. 1, 120 ) may be triggered as well.
  • Some examples of these functions of the second computing device ( FIG. 1, 120 ) that may be accessed via the methods described herein may include a data backup process, a voice command function, a camera function, an email function, among others.
  • the second computing device ( FIG. 1, 120 ) may be an Internet of Things (IoT)-type device that servers a special function such as cooking, heating, cooling, light augmentation in a home, security, among others.
  • IoT Internet of Things
  • the functionality of these IoT-type devices may be accessed using the biometric data sensors ( FIG. 1, 110 ) of the first computing device ( FIG. 1, 105 ) as described herein.
  • the specification and figures describe a system and method to be used in order to unlock a second computing device using the biometric data sensors of a first computing device.
  • Authentication of any biometric data or patterns obtained via the biometric data sensors of the first computing device may be accomplished on either the first computing device or second computing device.
  • a determination as to which of the first or second computing devices completes the biometric data authentication process may depend on whether biometric data is maintained on the second computing device and whether the second computing device includes biometric data analyzing software.
  • a token may be sent to the second computing device which then authenticates the token and unlocks the second computing device.
  • Specific token reception software presented in the form of computer usable program code may be maintained on the second computing device so as be able to receive the token and provide access to the second computing device as described herein.
  • This system and method effectively extends the capabilities of those computing devices that do not include biometric data sensors.
  • the capabilities are extended by allowing for the biometric data sensors of another computing device to achieve relatively higher security. Further, user experience may be achieved if and when the user of the second computing device forgets unlocking passwords to the second computing device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A computing system may, in an example, include a first computing device that includes at least one biometric data sensor and a biometric synchronization module on the first computing device to, when executed by a processor, synchronize biometric data from the first computing device to a second computing device in response to a biometric registration request.

Description

    BACKGROUND
  • Various types of computing devices exist that implement various types of security in order to prevent unauthorized access to data stored thereon or functionality provided by the computing device. Passwords may be used to gain access to the computing device with the owner or those authorized to access the computing device having knowledge of the password information.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings illustrate various examples of the principles described herein and are part of the specification. The illustrated examples are given merely for illustration, and do not limit the scope of the claims.
  • FIG. 1 is a diagram of a computing system according to an example of the principles described herein.
  • FIG. 2 is a block diagram of a computing device according to an example of the principles described herein.
  • FIG. 3 is a flowchart showing a method of synchronizing biometric data according to an example of the principles described herein.
  • FIG. 4 is a flowchart showing a method of synchronizing biometric data according to an example of the principles described herein.
  • Throughout the drawings, identical reference numbers designate similar, but not necessarily identical, elements. The figures are not necessarily to scale, and the size of some parts may be exaggerated to more clearly illustrate the example shown. Moreover, the drawings provide examples and/or implementations consistent with the description; however, the description is not limited to the examples and/or implementations provided in the drawings.
  • DETAILED DESCRIPTION
  • As mentioned above, passwords may be used to gain access to a computing device by those presented with the password and actually authorized to gain access to the computing device. However, passwords have proven difficult in their use due to, in part, an authorized person forgetting the password. However, the importance of maintaining data security with regards to sensitive data such as medical records, bank records and the like has not decreased. Indeed, with the proliferation of this sensitive data on computing devices, the importance of protecting this data has increased.
  • To better protect this sensitive data, some computing devices implement biometric data sensors that detect the biometric data of a user and deny or provide access to the computing device based on the sensed biometric data. Examples of these biometric data sensors include fingerprint sensors, face recognition cameras, retinal scanners, among others.
  • Even though some of these computing devices include these biometric data sensors, not all computing devices include such hardware. Indeed, some computing devices may not warrant the use of biometric data sensors and instead forego their implementation based on the costs involved with implementing the biometric data sensors or the physical dimensions of the computing devices themselves limiting their use.
  • The present specification describes a computing system that includes a first computing device comprising at least one biometric data sensor and a biometric synchronization module on the first computing device to, when executed by a processor, synchronize biometric data from the first computing device to a second computing device in response to a biometric registration request.
  • The present specification further describes a computing device that includes at least one biometric sensor and a token generation module to generate, at least, access tokens to be sent to a receiving computing device after a determination that biometric data has been synchronized between the computing device and the receiving computing device.
  • The present specification further describes a method of synchronizing biometric data that includes at a first computing device, receiving a request to unlock a second computing device using biometric data and at the first computing device, sending a biometric synchronization request to the second computing device to synchronize biometric data from the first computing device to the second computing device.
  • As used in the present specification and in the appended claims, the term “biometric data” or “biometric patterns” are meant to be understood as patterns and data describing the physical characteristics of a user of a computing device. The biometric data or biometric patterns are obtained when a user interfaces with a biometric data sensor.
  • Additionally, as used in the present specification and in the appended claims, the term “a number of” or similar language is meant to be understood broadly as any positive number comprising 1 to infinity; zero not being a number, but the absence of a number.
  • In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present systems and methods. It will be apparent, however, to one skilled in the art that the present apparatus, systems, and methods may be practiced without these specific details. Reference in the specification to “an example” or similar language means that a particular feature, structure, or characteristic described in connection with that example is included as described, but may or may not be included in other examples.
  • Turning now to the figures, FIG. 1 is a diagram of a computing system according to an example of the principles described herein. The computing system (100) may include a first computing device (105) and a second computing device (120); the second computing device (120) being selectively communicatively coupled to the first computing device (105). The first computing device (105) and second computing device (120) may be communicatively coupled to each other via a cable, wireless such as via a Wi-Fi connection or a Bluetooth connection, near-field communication, among others. The first computing device (105) and second computing device (120) may be an electronic device that includes, at least, a processor. Examples of electronic devices include servers, desktop computers, laptop computers, personal digital assistants (PDAs), mobile devices, smartphones, gaming systems, and tablets, among other electronic devices.
  • The first computing device (105) may include any number of biometric data sensors (110). The biometric data sensors (110) may be capable of detecting a user's physical characteristics and comparing those characteristics to a database of characteristics. Once detected and/or stored, the user's characteristics may be referred to as biometric data. When the user's scanned characteristics match those characteristics maintained in the database, access and/or control of the first computing device (105) is granted. When the user's scanned characteristics do not match any characteristics maintained in the database, access and/or control of the first computing device (105) is not granted.
  • User characteristics may include fingerprints, palm veins, retinal details, facial features, deoxyribonucleic acid (DNA) sequence, palm print, hand geometry, iris details voice pattern, gait, odor or scent, among other characteristics. These user characteristics may be defined herein as biometric data. Thus, the biometric data sensor (110) may be any sensor that can detect these user characteristics and compare those characteristics to a database of characteristics. By way of example, the biometric data sensor (110) may be a fingerprint scanner, a palm scanner, a retinal scanner, a facial recognition device, a hand scanner, an iris scanner, a voice analyzer, a DNA sequencer, a camera or any other device that can detect the user characteristics described herein. For simplicity of description, the biometric data sensor (110) will be referred to as a fingerprint scanner when specific examples are presented. The use of this example is not meant to be understood a limiting the present description and, instead, the present description contemplates any type of biometric data sensor (110) to detect any type of user characteristic described herein and store the biometric data describing those user characteristics.
  • The first computing device (105) and second computing device (120) may each include various hardware components. Among these hardware components may be a number of processors, a number of data storage devices, a number of peripheral device adapters, and a number of network adapters. These hardware components may be interconnected through the use of a number of busses and/or network connections. In one example, the processor, data storage device, peripheral device adapters, and network adapter may be communicatively coupled via a bus.
  • The processor may include the hardware architecture to retrieve executable code from the data storage device and execute the executable code. The executable code may, when executed by the processor, cause the processor to implement at least the functionality of, at the first computing device (105), receive a request to unlock the second computing device (120) using biometric data and, at the first computing device (105), send a biometric synchronization request to the second computing device (120) to synchronize biometric data from the first computing device (105) to the second computing device (120), according to the methods of the present specification described herein. In the course of executing code, the processor may receive input from and provide output to a number of the remaining hardware units.
  • The data storage device may store data such as executable program code that is executed by the processor or other processing device as well as user-specific biometric data describing the characteristics of the user as described herein. Further, the data storage device may specifically store computer code representing a number of applications that the processor executes to implement at least the functionality described herein. The data storage device (102) may include various types of memory modules, including volatile and nonvolatile memory. For example, the data storage device (102) of the examples described herein includes Random Access Memory (RAM), Read Only Memory (ROM), and Hard Disk Drive (HDD) memory. Many other types of memory may also be utilized, and the present specification contemplates the use of many varying type(s) of memory in the data storage device as may suit a particular application of the principles described herein. In certain examples, different types of memory in the data storage device may be used for different data storage needs. For example, in certain examples the processor may boot from Read Only Memory (ROM), maintain nonvolatile storage in the Hard Disk Drive (HDD) memory, and execute program code stored in Random Access Memory (RAM). Generally, the data storage device (102) may comprise a computer readable medium, a computer readable storage medium, or a non-transitory computer readable medium, among others. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store computer usable program code for use by or in connection with an instruction execution system, apparatus, or device. In another example, a computer readable storage medium may be any non-transitory medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • The hardware adapters in the first computing device (105) and second computing device (120) enable the processor to interface with various other hardware elements, external and internal to each of the first computing device (105) and second computing device (120). For example, the peripheral device adapters may provide an interface to input/output devices, such as, for example, display device, a mouse, or a keyboard. The peripheral device adapters may also provide access to other external devices such as an external storage device, a number of network devices such as, for example, servers, switches, and routers, client devices, other types of computing devices, and combinations thereof.
  • At least the first computing device (105) may further include a number of modules used in the implementation of the methods described herein. The various modules within the first computing device (105) may include executable program code that may be executed separately. In this example, the various modules may be stored as separate computer program products. In another example, the various modules within the first computing device (105) may be combined within a number of computer program products; each computer program product comprising a number of the modules.
  • The first computing device (105) may include a biometric synchronization module (115) to, when executed by the processor, synchronize biometric data between the first computing device (105) that includes at least one biometric data sensor (110) with the second computing device (120) that does not include any biometric data sensor (110). The biometric synchronization module (115) module (110) may receive a request to synchronize the biometric data with the second computing device (120) in order to allow a user to access the functions of the second computing device (120). The first computing device (105) may further include a token generation module to generate, at least, access tokens to be sent to the second computing device (120) after a determination that biometric data has been synchronized between the first computing device (105) and the second computing device (120).
  • During operation of the computing system (100), the first computing device (105) may determine whether a biometric database of the first computing device (105) and the second computing device (120) is shared. If not, the first computing device (105) may send a request to the second computing device (120) inquiring whether the second computing device (120) has a biometric database analyzer consistent with the biometric data sensor (110) of the first computing device (105). As an example, the first computing device (105), having a fingerprint sensor, may send a request to the second computing device (120) inquiring whether the second computing device (120) has a fingerprint database analyzer that can analyze fingerprint data. Upon a determination that the second computing device (120) does not comprise a fingerprint data analyzer, the process stops and notice is given to the user that the second computing device (120) cannot analyze the fingerprint data.
  • When it has been determined that the first computing device (105) and the second computing device (120) share the same biometric data in their respective biometric databases, a successful scan of a user's biometric data using the biometric data sensor (110) of the first computing device (105) will cause an unlock token to be sent to the second computing device (120). When the second computing device (120) receives the unlock token, the second computing device (120) may be unlocked thereby providing access to the second computing device (120) to the user.
  • As a consequence of the operation of the first computing device (105) as described herein, a computing device not having a biometric data sensor (110) such as the second computing device (120) may be unlocked using the hardware devices such as the biometric data sensors (110) of the first computing device (105). This alleviates a user from memorizing a password in order to gain access to the second computing device (120) and instead using the user's own physical characteristics to access the second computing device (120). As the user initiates the process as described herein, the second computing device (120) may maintain the biometric data received from the first computing device (105) in a biometric database on the second computing device (120). This allows a user to consistently send an unlock token to the second computing device (120) whenever the user attempts to gain access to the second computing device (120). Other user's biometric data may also be maintained in the biometric database of the second computing device (120) so as to allow multiple first computing devices (105) to provide access to the second computing device (120). Further, with the use of biometric data, the process used to access both the first computing device (105) and second computing device (120) may be relatively more secure because a password is not used to complete the unlocking process of either the first computing device (105) and second computing device (120).
  • FIG. 2 is a block diagram of a computing device (205) according to an example of the principles described herein. The computing device (205) may include a biometric sensor (210) similar to the biometric data sensor (FIG. 1, 110) described above in connection with FIG. 1. The biometric sensor (210) may detect the user characteristics and maintain biometric data in a biometric database as described herein.
  • The computing device (205) may further include a token generation module (215). The token generation module (215) may generate an unlock token after receipt of an indication at the computing device (205) that biometric data has been authorized at the biometric sensor (210). The token may include computer readable instructions indicating to a receiving computing device that the user is authorized to access the receiving computing device and provide such access. In an example, the token provided by the token generation module (215) may be encrypted providing additional security in the transaction between the computing device and receiving computing device.
  • FIG. 3 is a flowchart showing a method (300) of synchronizing biometric data according to an example of the principles described herein. The method (300) may begin with, at a first computing device, receiving (305) a request to unlock a second computing device using biometric data. The request may be initiated by a user of the first computing device (FIG. 1, 105) when attempting to access a second computing device (FIG. 1, 120).
  • After the request has been received (305) by the first computing device (FIG. 1, 105), the first computing device (FIG. 1, 105) may send (310) a biometric synchronization request to the second computing device (FIG. 1, 120) to synchronize biometric data from the first computing device (FIG. 1, 105) to the second computing device (FIG. 1, 120). Again, the synchronization of the biometric data between the first and second computing devices (FIG. 1, 105, 120) may either cause the first computing device (FIG. 1, 105) to send biometric data to the second computing device (FIG. 1, 120) or begin an authentication process using the biometric data sensor (FIG. 1, 110) so as to initiate the sending of an access token to the second computing device (FIG. 1, 120).
  • FIG. 4 is a flowchart showing a method (400) of synchronizing biometric data according to an example of the principles described herein. The method (400) may begin with the first computing device (FIG. 1, 105) being placed (405) in a standby mode. This standby mode may include any mode that places the first computing device (FIG. 1, 105) in a state of accepting input from a user after any number of input actions.
  • The method (400) may continue with a signal being sent (410) to unlock the second computing device (FIG. 1, 120). The signal may be sent (410) to the second computing device (FIG. 1, 120) after input from a user on the first computing device (FIG. 1, 105) initiates an unlock process for the second computing device (FIG. 1, 120). Certain graphical user interfaces may be presented to the user on the first computing device (FIG. 1, 105) in order to cause the signal to be sent (410) to the second computing device (FIG. 1, 120).
  • The method (400) then continues by determining (415) if the first computing device (FIG. 1, 105) and second computing device (FIG. 1, 120) share the same biometric database. The biometric database of the first computing device (FIG. 1, 105) may include any biometric data received from the biometric data sensors (FIG. 1, 110) of the first computing device (FIG. 1, 105). In an example, the second computing device (FIG. 1, 120) may not include the same biometric data or even have access to the same biometric database as that found in the first computing device (FIG. 1, 105). When this is the case (Decision No, 415), a determination (420) may be made as to whether the second computing device (FIG. 1, 120) has any biometric analyzing capabilities and biometric database data so that matching of any biometric data may be completed by the second computing device (FIG. 1, 120). If not, the process may return to placing the first computing device (FIG. 1, 105) in a standby node and/or notifying a user, via the graphical user interface of the first computing device (FIG. 1, 105), that the second computing device (FIG. 1, 120) cannot be unlocked due to the lack of authentication. In an example, the second computing device (FIG. 1, 120) may be provided with access to a biometric database and a biometric data analyzer may be installed on the second computing device (FIG. 1, 120) in order to allow access to the second computing device (FIG. 1, 120) in a later process.
  • When it has been determined (Decision YES, 420) that the second computing device (FIG. 1, 120) maintains a biometric database and can analyze that biometric data sent to it from the first computing device (FIG. 1, 105), it is then determined (425) if a biometric scan using the biometric data sensors (FIG. 1, 110) on the first computing device (FIG. 1, 105) are successful. If not (Determination No, 425), the process continues with the first computing device (FIG. 1, 105) notifying the user of an unsuccessful biometric scan and places (405) the first computing device (FIG. 1, 105) in a standby mode. If it has been determined (Determination YES, 425) that the biometric scan was successful, it is then determined (425) whether the biometric pattern obtained by the biometric data sensors (FIG. 1, 110) of the first computing device (FIG. 1, 105) have been successfully transferred to the second computing device (FIG. 1, 120). If not, (Determination No, 430), the process continues with the first computing device (FIG. 1, 105) notifying the user of an unsuccessful biometric scan and places (405) the first computing device (FIG. 1, 105) in a standby mode.
  • If it is determined (425) that the biometric pattern obtained by the biometric data sensors (FIG. 1, 110) of the first computing device (FIG. 1, 105) have been successfully transferred to the second computing device (FIG. 1, 120), the second computing device (FIG. 1, 120) then determines (435) whether the biometric patterns are authentic. If it is determined (Determination No, 435) that the biometric patterns received by the first computing device (FIG. 1, 105) are not authentic, the second computing device (FIG. 1, 120) is maintained in a standby mode and access to the second computing device (FIG. 1, 120) is not granted. However, if it is determined (Determination No, 435) that the biometric patterns received by the first computing device (FIG. 1, 105) are authentic, the second computing device (FIG. 1, 120) is unlocked (460).
  • If it has been determined (Determination YES, 415) that the first computing device (FIG. 1, 105) and second computing device (FIG. 1, 120) share the same biometric database, the first computing device (FIG. 1, 105) may receive (440) biometric authentication from the biometric data sensors (FIG. 1, 110) on the first computing device (FIG. 1, 105), make a determination (Determination YES. 445) that the biometric scan was successful and authenticated (Determination YES, 450) and then send (455) an unlock token to the second computing device (FIG. 1, 120) instructing the second computing device (FIG. 1, 120) to be unlocked (460). With this method (400) a user may unlock the second computing device (FIG. 1, 120) using the biometric data sensors (FIG. 1, 110) of the first computing device (FIG. 1, 105) even where the second computing device (FIG. 1, 120) does not include biometric data sensors (FIG. 1, 110) of its own. In an example, even where the second computing device (FIG. 1, 120) includes its own biometric data sensors (FIG. 1, 110), the first computing device (FIG. 1, 105) may implement this method (400) in order to unlock the second computing device (FIG. 1, 120). Still further, in an example where the second computing device (FIG. 1, 120) includes biometric data sensors (FIG. 1, 110), the second computing device (FIG. 1, 120) may be used to unlock the first computing device (FIG. 1, 105) per the method (400) described herein.
  • Aspects of the present system and method are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to examples of the principles described herein. Each block of the flowchart illustrations and block diagrams, and combinations of blocks in the flowchart illustrations and block diagrams, may be implemented by computer usable program code. The computer usable program code may be provided to a processor of a general purpose computer, special purpose computer, the first computing device (FIG. 1, 105), second computing device (FIG. 1, 120), or other programmable data processing apparatus to produce a machine, such that the computer usable program code, when executed via, for example, the processor of either the first computing device (FIG. 1, 105), second computing device (FIG. 1, 120), or other programmable data processing apparatus, implement the functions or acts specified in the flowchart and/or block diagram block or blocks. In one example, the computer usable program code may be embodied within a computer readable storage medium; the computer readable storage medium being part of the computer program product. In one example, the computer readable storage medium is a non-transitory computer readable medium.
  • Although the system and methods describe the unlocking of the second computing device (FIG. 1, 120) using the biometric data sensors (FIG. 1, 110) of the first computing device (FIG. 1, 105), other functions of the second computing device (FIG. 1, 120) may be triggered as well. Some examples of these functions of the second computing device (FIG. 1, 120) that may be accessed via the methods described herein may include a data backup process, a voice command function, a camera function, an email function, among others. As an example, the second computing device (FIG. 1, 120) may be an Internet of Things (IoT)-type device that servers a special function such as cooking, heating, cooling, light augmentation in a home, security, among others. Thus, the functionality of these IoT-type devices may be accessed using the biometric data sensors (FIG. 1, 110) of the first computing device (FIG. 1, 105) as described herein.
  • The specification and figures describe a system and method to be used in order to unlock a second computing device using the biometric data sensors of a first computing device. Authentication of any biometric data or patterns obtained via the biometric data sensors of the first computing device may be accomplished on either the first computing device or second computing device. A determination as to which of the first or second computing devices completes the biometric data authentication process may depend on whether biometric data is maintained on the second computing device and whether the second computing device includes biometric data analyzing software. Where the first computing device authenticates biometric data obtained from a biometric data sensor, a token may be sent to the second computing device which then authenticates the token and unlocks the second computing device. Specific token reception software presented in the form of computer usable program code may be maintained on the second computing device so as be able to receive the token and provide access to the second computing device as described herein.
  • This system and method effectively extends the capabilities of those computing devices that do not include biometric data sensors. The capabilities are extended by allowing for the biometric data sensors of another computing device to achieve relatively higher security. Further, user experience may be achieved if and when the user of the second computing device forgets unlocking passwords to the second computing device.
  • The preceding description has been presented to illustrate and describe examples of the principles described. This description is not intended to be exhaustive or to limit these principles to any precise form disclosed. Many modifications and variations are possible in light of the above teaching.

Claims (15)

What is claimed is:
1. A computing system, comprising:
a first computing device comprising at least one biometric data sensor, and
a biometric synchronization module on the first computing device to, when executed by a processor, synchronize biometric data from the first computing device to a second computing device in response to a biometric registration request.
2. The computing system of claim 1, wherein the first computing device receives a request to gain access to the second computing device using biometric data obtained via the biometric data sensor.
3. The computing system of claim 2, wherein the first computing device determines whether the first and second computing device have synchronized biometric data.
4. The computing system of claim 3, wherein the first computing device sends updated biometric data sensor specific biometric data to the second computing devices when it is determined that the first and second computing device do not have synchronized biometric data.
5. The computing system of claim 4, wherein the first computing device sends a request for the second computing device to review a biometric scan initiated at the first computing device, compare the scan with the updated biometric data from the first computing device in order to determine whether access to the second computing device should be granted.
6. The computing system of claim 3, wherein the first computing device sends an unlock token to the second computing device when is it determined that the first and second computing device do have synchronized biometric data and after the first computing device has determined that a successful biometric scan has been completed using the biometric data sensor on the first computing device.
7. The computing system of claim 1, wherein the second computing device does not include a biometric data sensor.
8. The computing system of claim 3, wherein the first computing device sends a request to enable a voice command detection function to the second computing device when is it determined that the first and second computing device do have synchronized biometric data and after the first computing device has determined that a successful biometric scan has been completed using the biometric data sensor on the first computing device.
9. A computing device, comprising:
at least one biometric sensor; and
a token generation module to generate, at least, access tokens to be sent to a receiving computing device after a determination that biometric data has been synchronized between the computing device and the receiving computing device.
10. The computing device of claim 9, wherein the access tokens include:
an access token granting access to a voice recognition function on the receiving computing device;
an access token granting access to back up data from the computing device or maintained on the receiving computing device;
an access token granting access to a camera device on the receiving computing device, an access token granting access to executable computer usable program code maintained on the receiving computing device;
or combinations thereof.
11. The computing device of claim 9, wherein the computing device further comprises a biometric synchronization module to, when executed by a processor, synchronize biometric data from the computing device to the receiving computing device in response to a biometric registration request.
12. The computing device of claim 9, further comprising a biometric data database to maintain biometric data for a number of users authorized to access at least the computing device.
13. A method of synchronizing biometric data, comprising:
at a first computing device, receiving a request to unlock a second computing device using biometric data; and
at the first computing device, sending a biometric synchronization request to the second computing device to synchronize biometric data from the first computing device to the second computing device.
14. The method of synchronizing biometric data of claim 13, further comprising sending an access token to the second computing device upon, at least, a determination that the biometric data has been synchronized between the first and second computing device.
15. The method of synchronizing biometric data of claim 13, further comprising sending an access token to the second computing device upon, at least, a request at the first computing device to access functionality of the second computing device.
US16/479,290 2017-06-23 2017-06-23 Biometric data synchronization devices Active 2037-10-12 US11178142B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2017/039052 WO2018236391A1 (en) 2017-06-23 2017-06-23 Biometric data synchronization devices

Publications (2)

Publication Number Publication Date
US20200120090A1 true US20200120090A1 (en) 2020-04-16
US11178142B2 US11178142B2 (en) 2021-11-16

Family

ID=64737183

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/479,290 Active 2037-10-12 US11178142B2 (en) 2017-06-23 2017-06-23 Biometric data synchronization devices

Country Status (4)

Country Link
US (1) US11178142B2 (en)
EP (1) EP3559848A4 (en)
CN (1) CN110366725A (en)
WO (1) WO2018236391A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11178142B2 (en) * 2017-06-23 2021-11-16 Hewlett-Packard Development Company, L.P. Biometric data synchronization devices
US11212277B1 (en) * 2018-07-02 2021-12-28 Knwn Technologies, Inc. System and method for securing, perfecting and accelerating biometric identification via holographic environmental data
US20220092600A1 (en) * 2020-09-18 2022-03-24 Rodney Teansky System for Credit Card, Debit Card, and Voting Fraud Prevention
US20220147611A1 (en) * 2019-02-25 2022-05-12 Sony Group Corporation Information processing apparatus, information processing method, and program

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114973428A (en) * 2021-02-24 2022-08-30 华为技术有限公司 Biological information sharing method, electronic device and medium thereof

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7509499B2 (en) * 2002-02-12 2009-03-24 Semtek Innovative Solutions Corporation Secure token access distributed database system
US7664961B2 (en) 2005-09-12 2010-02-16 Imation Corp. Wireless handheld device with local biometric authentication
CN101479752A (en) * 2006-04-24 2009-07-08 加密密钥有限公司 Portable device and methods for performing secure transactions
US8738925B1 (en) * 2013-01-07 2014-05-27 Fitbit, Inc. Wireless portable biometric device syncing
JP5852265B2 (en) * 2011-12-27 2016-02-03 インテル コーポレイション COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method
US20130268687A1 (en) * 2012-04-09 2013-10-10 Mcafee, Inc. Wireless token device
US20140068725A1 (en) 2012-08-31 2014-03-06 Apple Inc. Wireless Pairing and Communication Between Devices Using Biometric Data
US20140090039A1 (en) * 2012-09-24 2014-03-27 Plantronics, Inc. Secure System Access Using Mobile Biometric Devices
US20140096270A1 (en) * 2012-09-28 2014-04-03 Richard T. Beckwith Secure data containers and data access control
US9887983B2 (en) * 2013-10-29 2018-02-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US9330513B2 (en) * 2013-05-31 2016-05-03 Microsoft Technology Licensing, Llc Resource management based on biometric data
CN105474573B (en) * 2013-09-19 2019-02-15 英特尔公司 For synchronizing and restoring the technology of reference template
US9684778B2 (en) * 2013-12-28 2017-06-20 Intel Corporation Extending user authentication across a trust group of smart devices
US20170004296A1 (en) * 2014-03-28 2017-01-05 Panasonic Intellectual Property Management Co., Ltd. Biometric authentication method and biometric authentication system
KR20170005847A (en) * 2014-05-13 2017-01-16 엘리먼트, 인크. System and method for electronic key provisioning and access management in connection with mobile devices
US9590984B2 (en) * 2014-06-04 2017-03-07 Grandios Technologies, Llc Smartphone fingerprint pass-through system
CN205050141U (en) 2014-09-30 2016-02-24 苹果公司 Electronic equipment
US9700799B2 (en) * 2014-12-10 2017-07-11 Disney Enterprises, Inc. Authenticating users across applications and devices using biometric authentication or wearable devices
US10061910B2 (en) * 2015-06-09 2018-08-28 Intel Corporation Secure biometric data capture, processing and management for selectively prohibiting access to a data storage component from an application execution environment
CN105704133A (en) * 2016-02-19 2016-06-22 广东欧珀移动通信有限公司 Method, terminal and server for data synchronism
US10769635B2 (en) * 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
CN110366725A (en) * 2017-06-23 2019-10-22 惠普发展公司,有限责任合伙企业 Biometric data synchronizer

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11178142B2 (en) * 2017-06-23 2021-11-16 Hewlett-Packard Development Company, L.P. Biometric data synchronization devices
US11212277B1 (en) * 2018-07-02 2021-12-28 Knwn Technologies, Inc. System and method for securing, perfecting and accelerating biometric identification via holographic environmental data
US20220147611A1 (en) * 2019-02-25 2022-05-12 Sony Group Corporation Information processing apparatus, information processing method, and program
US20220092600A1 (en) * 2020-09-18 2022-03-24 Rodney Teansky System for Credit Card, Debit Card, and Voting Fraud Prevention

Also Published As

Publication number Publication date
CN110366725A (en) 2019-10-22
EP3559848A1 (en) 2019-10-30
WO2018236391A1 (en) 2018-12-27
US11178142B2 (en) 2021-11-16
EP3559848A4 (en) 2020-08-19

Similar Documents

Publication Publication Date Title
US11178142B2 (en) Biometric data synchronization devices
US10713345B2 (en) Secure biometric authentication with client-side feature extraction
US9411946B2 (en) Fingerprint password
KR102132507B1 (en) Resource management based on biometric data
US9544306B2 (en) Attempted security breach remediation
US9258301B2 (en) Advanced authentication techniques
US10097994B2 (en) Mobile touch authentication refresh
WO2018194506A1 (en) Method for fingerprint authentication using force value
CN103067397A (en) Security authentication method, access gateway and authentication server of desktop cloud system
KR20130113486A (en) User identity attestation in mobile commerce
US10885525B1 (en) Method and system for employing biometric data to authorize cloud-based transactions
WO2016188230A1 (en) Unlocking method and device
US20210243186A1 (en) Systems and methods for providing data access based on physical proximity to device
US20130198836A1 (en) Facial Recognition Streamlined Login
US9923976B2 (en) Control device and control method
JP2005208993A (en) User authentication system
US11575664B2 (en) Information handling systems and methods to manage tickets based on user presence, system state and ticket management policy
US11423138B2 (en) Firmware access based on temporary passwords
KR102010764B1 (en) Computer security system and method using authentication function in smart phone
US10762182B2 (en) Detection system, fingerprint sensor, and method of finger touch authentication thereof
US20230179596A1 (en) Access authentication using obfuscated biometrics
US11055389B2 (en) Biometric authentication using molecular snapshots
US20240106823A1 (en) Sharing a biometric token across platforms and devices for authentication
US20220121730A1 (en) Digital Rights Management Platform
US20230388310A1 (en) System and method for biometrically binding verifiable credentials to identity

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LI, CHING-HUA;HSIEH, YI-KANG;CHEN, CHUNG-CHUN;AND OTHERS;REEL/FRAME:049798/0873

Effective date: 20170622

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE